Forensic investigators face significant challenges in securing crucial data from criminals' phones. University of Amsterdam PhD candidate Aya Fukami has identified hardware vulnerabilities in phones to bypass the security of modern devices, allowing her to extract data from phones in a way that was previously not possible.
Current phones are nearly impossible to investigate without the owner's permission. Security measures are personalized, and it often requires the owner's help to retrieve usable data. Suspects will of course not be very helpful in providing access to phones, or in some cases the owner could already be deceased.
"Traditional methods of hacking or scraping data from phones still often yield only encrypted data. Researchers then face great difficulty making that encrypted data usable," Fukami says. "It's a process that also takes a long time and doesn't always result in usable evidence."
To overcome this, Fukami explored ways to bypass vulnerabilities in phone system security. And she succeeded.
"Through exploiting the security mechanism implemented in common memory systems used in popular smartphones, we could access the hidden information, which can be used to decrypt the encrypted contents," said Fukami.
Research like this is necessary, given several developments. Phones not only have much better security now, but they also have much larger memory than 10 years ago. Additionally, manufacturers' attitudes toward governments have shifted, with a 2015 case between the FBI and Apple marking a critical turning point. In this case, Apple refused to give the FBI access to bypass iPhone security systems despite multiple requests. In the end, the FBI succeeded in breaking into the case phone with the help of a third-party. Therefore, the court case was dropped at the last minute.
"However, this case sparked a worldwide discussion about privacy against national security," said Fukami.
According to Fukami, cases like these highlight that investigators often lag behind criminals, especially in a world where product technology is advancing rapidly. She advocates for proactive research in forensic science on security systems. What is a breakthrough now will be outdated in a year, so it's important to keep thinking about countermeasures can be put in place.
"Forensic science has traditionally focused on retrieving raw data from phones," said Fukami. "I believe a hacker-like approach is beneficial in these situations. Data from phones is playing an increasingly important role in the courtroom. With these kinds of proactive approaches, we ensure that crucial evidence from a phone can more often be effectively used as evidence."
Republished courtesy of UVA